sirdarckcat / ctfairlinesLinks
☆11Updated 4 years ago
Alternatives and similar repositories for ctfairlines
Users that are interested in ctfairlines are comparing it to the libraries listed below
Sorting:
- ☆47Updated 6 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆89Updated 7 years ago
- All virtualization escape challenges and writeups in RealWorldCTF☆89Updated 6 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Updated 6 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Updated last year
- 2019 Advent Calendar, vmware pwnables☆50Updated 5 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Updated 6 years ago
- DC28CTF challenge parallel-af. Dataflow machine.☆59Updated 5 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆90Updated 6 years ago
- ☆68Updated last year
- My Material for the HITB presentation☆35Updated 5 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆48Updated last year
- exploit code for a bpf heap overflow vulnerability☆28Updated 6 years ago
- Tools released in CSS 2019☆38Updated 6 years ago
- ☆11Updated 4 years ago
- Python module to help in exploitation of the FILE structure in C☆27Updated 6 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆101Updated 5 years ago
- ☆52Updated 3 years ago
- ☆32Updated 3 years ago
- Materials from Fuzzing Bay Area meetups☆57Updated 5 years ago
- WCTF 2019 Onsite(Master) Challenge☆53Updated 6 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆67Updated 4 years ago
- How to get a linux kernel debug environment☆31Updated 7 years ago
- ☆40Updated 5 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆104Updated 4 years ago
- HITCON CTF 2018☆45Updated 7 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Updated 7 years ago
- WCTF 2019 challenge☆103Updated 6 years ago
- Heap exploitation technique bypassing heap ASLR☆48Updated 6 years ago
- ☆20Updated 3 years ago